Linux Matrix

Below are the tactics and techniques representing the Venafi Machine Identity Threat Model, based on MITRE’s ATT&CK matrix for Enterprise. The Matrix contains information for the Linux platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Impact
5 techniques 1 techniques 4 techniques 1 techniques 4 techniques 6 techniques 3 techniques 3 techniques 2 techniques 2 techniques 4 techniques
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Impact
5 techniques 1 techniques 4 techniques 1 techniques 4 techniques 6 techniques 3 techniques 3 techniques 2 techniques 2 techniques 4 techniques